Kategorie
Ebooki
-
Biznes i ekonomia
- Bitcoin
- Bizneswoman
- Coaching
- Controlling
- E-biznes
- Ekonomia
- Finanse
- Giełda i inwestycje
- Kompetencje osobiste
- Komputer w biurze
- Komunikacja i negocjacje
- Mała firma
- Marketing
- Motywacja
- Multimedialne szkolenia
- Nieruchomości
- Perswazja i NLP
- Podatki
- Polityka społeczna
- Poradniki
- Prezentacje
- Przywództwo
- Public Relation
- Raporty, analizy
- Sekret
- Social Media
- Sprzedaż
- Start-up
- Twoja kariera
- Zarządzanie
- Zarządzanie projektami
- Zasoby ludzkie (HR)
-
Dla dzieci
-
Dla młodzieży
-
Edukacja
-
Encyklopedie, słowniki
-
E-prasa
- Architektura i wnętrza
- Biznes i Ekonomia
- Dom i ogród
- E-Biznes
- Finanse
- Finanse osobiste
- Firma
- Fotografia
- Informatyka
- Kadry i płace
- Komputery, Excel
- Księgowość
- Kultura i literatura
- Naukowe i akademickie
- Ochrona środowiska
- Opiniotwórcze
- Oświata
- Podatki
- Podróże
- Psychologia
- Religia
- Rolnictwo
- Rynek książki i prasy
- Transport i Spedycja
- Zdrowie i uroda
-
Historia
-
Informatyka
- Aplikacje biurowe
- Bazy danych
- Bioinformatyka
- Biznes IT
- CAD/CAM
- Digital Lifestyle
- DTP
- Elektronika
- Fotografia cyfrowa
- Grafika komputerowa
- Gry
- Hacking
- Hardware
- IT w ekonomii
- Pakiety naukowe
- Podręczniki szkolne
- Podstawy komputera
- Programowanie
- Programowanie mobilne
- Serwery internetowe
- Sieci komputerowe
- Start-up
- Systemy operacyjne
- Sztuczna inteligencja
- Technologia dla dzieci
- Webmasterstwo
-
Inne
-
Języki obce
-
Kultura i sztuka
-
Lektury szkolne
-
Literatura
- Antologie
- Ballada
- Biografie i autobiografie
- Dla dorosłych
- Dramat
- Dzienniki, pamiętniki, listy
- Epos, epopeja
- Esej
- Fantastyka i science-fiction
- Felietony
- Fikcja
- Humor, satyra
- Inne
- Klasyczna
- Kryminał
- Literatura faktu
- Literatura piękna
- Mity i legendy
- Nobliści
- Nowele
- Obyczajowa
- Okultyzm i magia
- Opowiadania
- Pamiętniki
- Podróże
- Poemat
- Poezja
- Polityka
- Popularnonaukowa
- Powieść
- Powieść historyczna
- Proza
- Przygodowa
- Publicystyka
- Reportaż
- Romans i literatura obyczajowa
- Sensacja
- Thriller, Horror
- Wywiady i wspomnienia
-
Nauki przyrodnicze
-
Nauki społeczne
-
Podręczniki szkolne
-
Popularnonaukowe i akademickie
- Archeologia
- Bibliotekoznawstwo
- Filmoznawstwo
- Filologia
- Filologia polska
- Filozofia
- Finanse i bankowość
- Geografia
- Gospodarka
- Handel. Gospodarka światowa
- Historia i archeologia
- Historia sztuki i architektury
- Kulturoznawstwo
- Lingwistyka
- Literaturoznawstwo
- Logistyka
- Matematyka
- Medycyna
- Nauki humanistyczne
- Pedagogika
- Pomoce naukowe
- Popularnonaukowa
- Pozostałe
- Psychologia
- Socjologia
- Teatrologia
- Teologia
- Teorie i nauki ekonomiczne
- Transport i spedycja
- Wychowanie fizyczne
- Zarządzanie i marketing
-
Poradniki
-
Poradniki do gier
-
Poradniki zawodowe i specjalistyczne
-
Prawo
- BHP
- Historia
- Kodeks drogowy. Prawo jazdy
- Nauki prawne
- Ochrona zdrowia
- Ogólne, kompendium wiedzy
- Podręczniki akademickie
- Pozostałe
- Prawo budowlane i lokalowe
- Prawo cywilne
- Prawo finansowe
- Prawo gospodarcze
- Prawo gospodarcze i handlowe
- Prawo karne
- Prawo karne. Przestępstwa karne. Kryminologia
- Prawo międzynarodowe
- Prawo międzynarodowe i zagraniczne
- Prawo ochrony zdrowia
- Prawo oświatowe
- Prawo podatkowe
- Prawo pracy i ubezpieczeń społecznych
- Prawo publiczne, konstytucyjne i administracyjne
- Prawo rodzinne i opiekuńcze
- Prawo rolne
- Prawo socjalne, prawo pracy
- Prawo Unii Europejskiej
- Przemysł
- Rolne i ochrona środowiska
- Słowniki i encyklopedie
- Zamówienia publiczne
- Zarządzanie
-
Przewodniki i podróże
- Afryka
- Albumy
- Ameryka Południowa
- Ameryka Środkowa i Północna
- Australia, Nowa Zelandia, Oceania
- Austria
- Azja
- Bałkany
- Bliski Wschód
- Bułgaria
- Chiny
- Chorwacja
- Czechy
- Dania
- Egipt
- Estonia
- Europa
- Francja
- Góry
- Grecja
- Hiszpania
- Holandia
- Islandia
- Litwa
- Łotwa
- Mapy, Plany miast, Atlasy
- Miniprzewodniki
- Niemcy
- Norwegia
- Podróże aktywne
- Polska
- Portugalia
- Pozostałe
- Rosja
- Rumunia
- Słowacja
- Słowenia
- Szwajcaria
- Szwecja
- Świat
- Turcja
- Ukraina
- Węgry
- Wielka Brytania
- Włochy
-
Psychologia
- Filozofie życiowe
- Kompetencje psychospołeczne
- Komunikacja międzyludzka
- Mindfulness
- Ogólne
- Perswazja i NLP
- Psychologia akademicka
- Psychologia duszy i umysłu
- Psychologia pracy
- Relacje i związki
- Rodzicielstwo i psychologia dziecka
- Rozwiązywanie problemów
- Rozwój intelektualny
- Sekret
- Seksualność
- Uwodzenie
- Wygląd i wizerunek
- Życiowe filozofie
-
Religia
-
Sport, fitness, diety
-
Technika i mechanika
Audiobooki
-
Biznes i ekonomia
- Bitcoin
- Bizneswoman
- Coaching
- Controlling
- E-biznes
- Ekonomia
- Finanse
- Giełda i inwestycje
- Kompetencje osobiste
- Komunikacja i negocjacje
- Mała firma
- Marketing
- Motywacja
- Nieruchomości
- Perswazja i NLP
- Podatki
- Poradniki
- Prezentacje
- Przywództwo
- Public Relation
- Sekret
- Social Media
- Sprzedaż
- Start-up
- Twoja kariera
- Zarządzanie
- Zarządzanie projektami
- Zasoby ludzkie (HR)
-
Dla dzieci
-
Dla młodzieży
-
Edukacja
-
Encyklopedie, słowniki
-
Historia
-
Informatyka
-
Inne
-
Języki obce
-
Kultura i sztuka
-
Lektury szkolne
-
Literatura
- Antologie
- Ballada
- Biografie i autobiografie
- Dla dorosłych
- Dramat
- Dzienniki, pamiętniki, listy
- Epos, epopeja
- Esej
- Fantastyka i science-fiction
- Felietony
- Fikcja
- Humor, satyra
- Inne
- Klasyczna
- Kryminał
- Literatura faktu
- Literatura piękna
- Mity i legendy
- Nobliści
- Nowele
- Obyczajowa
- Okultyzm i magia
- Opowiadania
- Pamiętniki
- Podróże
- Poezja
- Polityka
- Popularnonaukowa
- Powieść
- Powieść historyczna
- Proza
- Przygodowa
- Publicystyka
- Reportaż
- Romans i literatura obyczajowa
- Sensacja
- Thriller, Horror
- Wywiady i wspomnienia
-
Nauki przyrodnicze
-
Nauki społeczne
-
Popularnonaukowe i akademickie
-
Poradniki
-
Poradniki zawodowe i specjalistyczne
-
Prawo
-
Przewodniki i podróże
-
Psychologia
- Filozofie życiowe
- Komunikacja międzyludzka
- Mindfulness
- Ogólne
- Perswazja i NLP
- Psychologia akademicka
- Psychologia duszy i umysłu
- Psychologia pracy
- Relacje i związki
- Rodzicielstwo i psychologia dziecka
- Rozwiązywanie problemów
- Rozwój intelektualny
- Sekret
- Seksualność
- Uwodzenie
- Wygląd i wizerunek
- Życiowe filozofie
-
Religia
-
Sport, fitness, diety
-
Technika i mechanika
Kursy video
-
Bazy danych
-
Big Data
-
Biznes, ekonomia i marketing
-
Cyberbezpieczeństwo
-
Data Science
-
DevOps
-
Dla dzieci
-
Elektronika
-
Grafika/Wideo/CAX
-
Gry
-
Microsoft Office
-
Narzędzia programistyczne
-
Programowanie
-
Rozwój osobisty
-
Sieci komputerowe
-
Systemy operacyjne
-
Testowanie oprogramowania
-
Urządzenia mobilne
-
UX/UI
-
Web development
-
Zarządzanie
Podcasty
Szczegóły ebooka
Zaloguj się, jeśli jesteś zainteresowany treścią pozycji.
Enterprise Security: A Data-Centric Approach to Securing the Enterprise. A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise
Ebook
Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It is a unique and forward thinking approach for deciding the best method to secure data in the enterprise, the cloud, and in BYOD environments.Enterprise Security: A Data-Centric Approach to Securing the Enterprise will guide you through redefining your security architecture to be more affective and turn information security into a business enablement process rather than a roadblock. This book will provide you with the areas where security must focus to ensure end-to-end security throughout the enterprise-supporting enterprise initiatives such as cloud and BYOD. Enterprise Security: A Data-Centric Approach to Securing the Enterprise will first introduce the reader to a new security architecture model and then explores the must have security methods and new tools that can used to secure the enterprise.This book will take a data-centric approach to securing the enterprise through the concept of Trust Models and building a layered security implementation focused on data. This is not your traditional security book focused on point solutions and the network aspect of security. This book combines best practice methods with new methods to approach enterprise security and how to remain agile as the enterprise demands more access to data from traditionally untrusted assets, hosted solutions, and third parties. Applied Information Security - A Data-Centric Approach to Securing the Enterprise will provide the reader an easy-to-follow flow from architecture to implementation, diagrams and recommended steps, and resources for further research and solution evaluation.This book is a reference and guide for all levels of enterprise security programs that have realized that non-data centric security is no longer practical and new methods must be used to secure the most critical assets in the enterprise.
- Enterprise Security: A Data-Centric Approach to Securing the Enterprise
- Table of Contents
- Enterprise Security: A Data-Centric Approach to Securing the Enterprise
- Credits
- About the Author
- About the Reviewers
- www.packtpub.com
- Support files, e-books, discount offers, and more
- Why Subscribe?
- Free Access for Packt account holders
- Instant Updates on New Packt Books
- Support files, e-books, discount offers, and more
- Preface
- What this book covers
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Errata
- Piracy
- Questions
- 1. Enterprise Security Overview
- The façade of enterprise security
- The history and making of the façade
- Our current approach to security
- Security architecture 101
- A new approach to security
- Enterprise security pitfalls
- Shortcomings of the current security architecture
- Communicating information security
- The cost of information security
- The conflicting message of enterprise security
- Proving a negative
- The road map to securing the enterprise
- Road map components
- Defining users
- Defining applications
- Defining data
- Defining roles
- Defining processes
- Defining policies and standards
- Defining network infrastructure
- Defining application security architecture
- Road map components
- Summary
- The façade of enterprise security
- 2. Security Architectures
- Redefining the network edge
- Drivers for redefinition
- Feature-rich web applications
- Business partner access
- Miscellaneous third-party services
- Cloud initiatives
- Drivers for redefinition
- Security architecture models
- Defining the building blocks of trust models
- Defining data in a trust model
- Data locations
- Data types
- Defining processes in a trust model
- Defining applications in a trust model
- Defining users in a trust model
- Defining roles in a trust model
- Defining policies and standards
- Defining data in a trust model
- Enterprise trust models
- Application user (external)
- Application owner (business partner)
- System owner (contractor)
- Data owner (internal)
- Automation
- Micro architectures
- Data risk-centric architectures
- BYOD initiatives
- Bring your own mobile device
- Bring your own PC
- Defining the building blocks of trust models
- Summary
- Redefining the network edge
- 3. Security As a Process
- Risk analysis
- What is risk analysis?
- Assessing threats
- Assessing impact
- Assessing probability
- Assessing risk
- Qualitative risk analysis
- Qualitative risk analysis exercise
- Quantitative risk analysis
- Quantitative risk analysis exercise
- Qualitative risk analysis
- Applying risk analysis to trust models
- Deciding on a risk analysis methodology
- Other thoughts on risk and new enterprise endeavors
- What is risk analysis?
- Security policies and standards
- Policy versus standard
- A quick note on wording
- Understanding security policy development
- Common IT security policies
- Information security policy
- Acceptable use policy
- Technology use policy
- Remote access policy
- Data classification policy
- Data handling policy
- Data retention policy
- Data destruction policy
- Policies for emerging technologies
- Policy considerations
- Emerging technology challenges
- Developing enterprise security standards
- Common IT security standards
- Wireless network security standard
- Trust model building block for wireless network security standard
- Applying trust models to develop standards
- Enterprise monitoring standard
- Enterprise encryption standard
- System hardening standard
- Wireless network security standard
- Common IT security standards
- Policy versus standard
- Security exceptions
- Security review of changes
- Perimeter security changes
- Data access changes
- Network architectural changes
- Summary
- Risk analysis
- 4. Securing the Network
- Overview
- Next generation firewalls
- Benefits of NGFW technology
- Application awareness
- Intrusion prevention
- Advanced malware mitigation
- Benefits of NGFW technology
- Intrusion detection and prevention
- Intrusion detection
- Intrusion prevention
- Detection methods
- Behavioral analysis
- Anomaly detection
- Signature-based detection
- Advanced persistent threat detection and mitigation
- Securing network services
- DNS
- DNS resolution
- DNS zone transfer
- DNS records
- DNSSEC
- E-mail
- SPAM filtering
- SPAM filtering in the cloud
- Local SPAM filtering
- SPAM relaying
- SPAM filtering
- File transfer
- Implementation considerations
- Secure file transfer protocols
- User authentication
- Implementation considerations
- User Internet access
- Websites
- Secure coding
- Next generation firewalls
- IPS
- Web application firewall
- DNS
- Network segmentation
- Network segmentation strategy
- Asset identification
- Security mechanisms
- Network segmentation strategy
- Applying security architecture to the network
- Security architecture in the DMZ
- Security architecture in the internal network
- Security architecture and internal segmentation
- Summary
- 5. Securing Systems
- System classification
- Implementation considerations
- System management
- Asset inventory labels
- System patching
- File integrity monitoring
- Implementation considerations
- Implementing FIM
- Real-time FIM
- Manual mode FIM
- Application whitelisting
- Implementation considerations
- Host-based intrusion prevention system
- Implementation considerations
- Host firewall
- Implementation considerations
- Anti-virus
- Signature-based anti-virus
- Heuristic anti-virus
- Implementation considerations
- User account management
- User roles and permissions
- User account auditing
- Policy enforcement
- Summary
- System classification
- 6. Securing Enterprise Data
- Data classification
- Identifying enterprise data
- Data types
- Data locations
- Automating discovery
- Assign data owners
- Assign data classification
- Identifying enterprise data
- Data Loss Prevention
- Data in storage
- Data in use
- Data in transit
- DLP implementation
- DLP Network
- DLP E-mail and Web
- DLP Discover
- DLP Endpoint
- Encryption and hashing
- Encryption and hashing explained
- Encryption
- Encrypting data at rest
- Database encryption
- The need for database encryption
- Methods of database encryption
- Application encryption
- Selective database encryption
- Complete database encryption
- Tokenization
- File share encryption
- Encrypting data in use
- Encrypting data in transit
- Encryption and hashing explained
- Tokenization
- Data masking
- Authorization
- Developing supporting processes
- Summary
- Data classification
- 7. Wireless Network Security
- Security and wireless networks
- Securing wireless networks
- A quick note on SSID cloaking and MAC filtering
- Wireless authentication
- Using shared key
- Caveats of shared key implementation
- Using IEEE 802.1X
- Caveats of 802.1X implementation
- Using shared key
- Wireless encryption
- WEP
- WPA
- WPA2
- Wireless network implementation
- Wireless signal considerations
- End system configuration
- Wireless encryption and authentication recommendations
- Encryption
- Authentication
- Client-side certificates
- EAP-TLS
- Unique system check
- Wireless segmentation
- Wireless network integration
- Wireless network intrusion prevention
- Summary
- 8. The Human Element of Security
- Social engineering
- Electronic communication methods
- Spam e-mail
- Key indicators of a spam e-mail
- Mitigating spam and e-mail threats
- Social media
- Mitigating social media threats
- Spam e-mail
- In-person methods
- Mitigating in-person social engineering
- Phone methods
- Mitigating phone methods
- Business networking sites
- Mitigating business networking site attacks
- Job posting sites
- Mitigating job posting-based attacks
- Electronic communication methods
- Security awareness training
- Training materials
- Computer-based training
- Classroom training
- Associate surveys
- Common knowledge
- Specialized material
- Effective training
- Continued education and checks
- Training materials
- Access denied enforcing least privilege
- Administrator access
- System administrator
- Data administrator
- Application administrator
- Administrator access
- Physical security
- Summary
- Social engineering
- 9. Security Monitoring
- Monitoring strategies
- Monitoring based on trust models
- Data monitoring
- Process monitoring
- Application monitoring
- User monitoring
- Monitoring based on network boundary
- Monitoring based on network segment
- Monitoring based on trust models
- Privileged user access
- Privileged data access
- Privileged system access
- Privileged application access
- Systems monitoring
- Operating system monitoring
- Host-based intrusion detection system
- Network security monitoring
- Next-generation firewalls
- Data loss prevention
- Malware detection and analysis
- Intrusion prevention
- Security Information and Event Management
- Predictive behavioral analysis
- Summary
- Monitoring strategies
- 10. Managing Security Incidents
- Defining a security incident
- Security event versus security incident
- Developing supporting processes
- Security incident detection and determination
- Physical security incidents
- Network-based security incidents
- Incident management
- Security incident detection and determination
- Getting enterprise support
- Building the incident response team
- Roles
- Desktop support
- Systems support
- Applications support
- Database support
- Network support
- Information security
- HR, legal, and public relations
- Responsibilities
- Expected response times
- Incident response contacts
- Supporting procedures
- A quick note on forensics
- Roles
- Developing the incident response plan
- Taking action
- Incident reporting
- Incident response
- In-house incident response
- Contracted incident response
- Summary
- Defining a security incident
- A. Applying Trust Models to Develop a Security Architectuture
- Encrypted file transfer (external)
- External user
- Internal user
- Data owner
- Automation
- Encrypted file transfer (external)
- B. Risk Analysis, Policy and Standard, and System Hardening Resources
- Risk analysis resources
- Policy and standard resources
- System hardening resources
- C. Security Tools List
- Tools for securing the network
- Tools for securing systems
- Tools for securing data
- Tools for security monitoring
- Tools for testing security
- Tools for vulnerability scanning
- D. Security Awareness Resources
- General presentation and training
- Social engineering
- Security awareness materials
- Safe and secure computing resources
- E. Security Incident Response Resources
- Building a CSIRT team
- Incident response process
- An example of incident response process flow
- A sample incident response report form
- A sample incident response form
- Index
- Tytuł: Enterprise Security: A Data-Centric Approach to Securing the Enterprise. A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise
- Autor: Aaron Woody
- Tytuł oryginału: Enterprise Security: A Data-Centric Approach to Securing the Enterprise. A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise
- ISBN: 9781849685979, 9781849685979
- Data wydania: 2013-02-22
- Format: Ebook
- Identyfikator pozycji: e_3ass
- Wydawca: Packt Publishing